NL2016272B1 - Method, system, device and software programme product for the remote authorization of a user of digital services. - Google Patents
Method, system, device and software programme product for the remote authorization of a user of digital services. Download PDFInfo
- Publication number
- NL2016272B1 NL2016272B1 NL2016272A NL2016272A NL2016272B1 NL 2016272 B1 NL2016272 B1 NL 2016272B1 NL 2016272 A NL2016272 A NL 2016272A NL 2016272 A NL2016272 A NL 2016272A NL 2016272 B1 NL2016272 B1 NL 2016272B1
- Authority
- NL
- Netherlands
- Prior art keywords
- data
- med
- biometric
- user
- identity document
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000013475 authorization Methods 0.000 title description 7
- 238000012546 transfer Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 4
- 238000013481 data capture Methods 0.000 description 18
- 230000004913 activation Effects 0.000 description 11
- 101100018419 Hordeum vulgare IDS3 gene Proteins 0.000 description 6
- 101100121695 Leucosceptrum canum GFDPS gene Proteins 0.000 description 6
- 230000003993 interaction Effects 0.000 description 5
- 101001013272 Homo sapiens Mediator of RNA polymerase II transcription subunit 29 Proteins 0.000 description 4
- 102100029668 Mediator of RNA polymerase II transcription subunit 29 Human genes 0.000 description 4
- 210000003813 thumb Anatomy 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000001815 facial effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012015 optical character recognition Methods 0.000 description 1
- 229920003023 plastic Polymers 0.000 description 1
- 239000004033 plastic Substances 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Biomedical Technology (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to Method of authorizing a user for accessing a server (29) and/or for receiving of an on-line service and the steps of: - Capturing biometric data (20,21) of the user using the sensor (14,22) on a ME(2) - Forming from the biometric data (20,21’) a biometric template (23,24) on the IDS (3) and storing the biometric template (23,24) on the MED (2), and - Via the IDS (3) allowing access to a server (29) by the user providing to the IDS (3), via the MED (2), matching biometric data (20’, 21’) and a biometric template (23, 24). On the MED (2), a local check can be made for a match between biometric data (20,21) of the user that are captured using the sensor (14,22) on the MED (2) and biometric data read out of the memory (10|of the identity document (11).
Description
Method, system, device and software programme product for the remote authorization of a user of digital services
Background of the invention
The invention relates to a method of authorizing a user on a server, in particular for participating in electronic transactions on the server or on a network connected to the server.
The invention also relates to a system and a device for authorizing a user on a server and to a computer program product for use in such system and device.
Field of the invention WO 2009/070430 describes a computer-implemented method for distributed public key inffastructures (PKI). In the distributed PKI, authentication data are stored on an edge device, such as a mobile phone, a personal digital assistant (PDA) and the like which is carried to place of intended use for presenting authentication data directly to a relying party system over a short-range data network. No remote validation service is required, saving bandwidth usage and response time.
The process of authenticating the individual to participate in a transaction with the relying party involves storing a set of credential data on the mobile device. The credential data may be derived ftom a passport, a birth certificate, a Common Access Card (CAC), a smartcard, a driver’s license and the like. Entering authentication data to gain access to the mobile phone (page 4 or fïg. 1) may include entering data pertaining to a fïngerprint, a photograph, an iris scan, a password or a personal Identification number (PIN). US 2015/0088778 describes a system and method for authorizing an individual or a group of individuals travelling, for passing customs control utilizing a personal electronic device on which a software application (App) has been downloaded and installed. The traveller inputs personal data into the electronic device for instance by scanning the passport using the optical character recognition function in a kiosk and saves this Information on the mobile device. Also a photograph is taken and saved on the device, and a number of questions, depending on the destination of travel of the user, are answered. Upon arrival in the jurisdiction, the passport information of the user, or group of users and answers to the questions are presented to the customs authority. If passage is granted, the traveller will be issued with a secure encrypted receipt in the form of a QR code on the App. The traveller presents this QR code to a reader to be allowed access to the jurisdiction. US 2003/0023858 describes a method for generating secure e-passports and e-visas. The individual seeking an electronic Identification document in a fïrst step obtains, on his personal computer, an electronic form from the issuing authority, including a unique serial number and digital watermark to detect forgeries. In a next step the individual provides relevant data such as name, address, birth etc. and electronically signs the electronic form. Next, the issuing authority adds a secure digital certifïcate and encrypts the ePassport, which is downloaded on a mobile device, such as a PDA, mobile phone etc. The ePassport on the mobile device may present a photograph. Upon showing the ePassport at appropriate checkpoints, such as on going through customs, the user uploads the ePassport from his mobile device into the authorities’ verifïcation mechanism via Bluetooth for verifïcation of the electronic signature and certifïcate.
It is an object of the present invention to pro vide a secure process, System, device and computer program product for authorization of a user to access a server or to receive an e-service via a Mobile Electronic Device, the user holding an identity document.
With the term “identity document” as used herein, a passport, a paper or plastics identity card, driver’s license, credit card or bank card, Identification badge, and e-passport or a chip comprising authentication and/or personalization data such as name, address, a digital portrait or other biometric data such as a thumb print, iris scan and the like is intended.
Summary of the invention
Hereto a method of authorizing a user for accessing a server and/or for receiving of an on-line service, involves the step of providing a mobile electronic device (MED), the MED having a memory unit and a sensor for receiving biometric data, the step of providing an Identity Document Server IDS comprising for a set of holders of an identity document, authentication data and personalization data corresponding to the respective identity document, the method further comprising the steps of: a. Loading a biometric template application and an ID data capture application on the MED, b. Capturing biometric data of the user using the sensor on the MED and providing the biometric data to the IDS, c. Forming ffom the biometric data a biometric template on the IDS and storing the biometric template in the memory unit of the MED, providing a registered activated identity MED, and d. Via the IDS allowing access to a server by the user providing to the IDS, via the MED, matching biometric data and a biometric template.
By capturing biometric data of the user using the sensor of the MED, which may for instance involve taking a self-portrait by the user with the camera of the MED or a thumb print using the touch sensor on the MED, and forwarding the biometric data to the Identity Document Server, a biometric template can be generated on the Identity Document Server. The identity document server is a computer device on which the provider of the identity document has stored authentication data and personalization data pertaining to the identity document and its holder. The software on the Identity document server generates on the basis of the biometric data that is provided to it, a biometric template, which is a numerical and/or graphical representation of the biometric data. This biometric template is retumed to the MED and is stored in the memory unit of the MED. The IDS stores the status of the MED as a registered activated identity MED. The holder of such a registered activated identity MED can request access to an electronic service by forwarding to the IDS a capture of his biometric data (‘selfie” portrait or thumbprint) that is forwarded to the IDS together with the template that is stored in the memory of the registered activated identity MED. If the captured biometric user data and the template are found to match on the IDS, access to the e-service can be provided by the IDS.
The method according to the invention provides a secure method of providing remote authorization of a user to electronic services on the basis of the user’s registered (on the IDS) identity document. The method provides the user with a 2 factor authentication, involving a trusted MED and one or more biometrics (e.g. face biometrics, thumbprints and the like).
An embodiment of the method according to the invention comprises, preceding step b, the steps of:
Providing an identity document having authentication data and personalization data stored in an electronic memory that is part of the document,
Transferring authentication data and personalization data from the memory of the Identity document into the memory of the MED via the ID data capture application,
Transferring the authentication data and the personalization data from the MED to the IDS via the ID data capture application,
Comparing the transferred authentication and personalization data with authentication and personalization data on the IDS wherein, when the transferred authentication and personalization data correspond with authentication and personalization data on the IDS: a positive comparison status is generated and a subscriber number of the MED is stored on the IDS and wherein in the absence of a positive a comparison status steps c-f are prevented from being carried out.
In the registering stage, the chip of the identity document is read out using the data capture application on the MED and the authentication data and personalization data obtained from the chip are sent to the IDS for verifïcation. Registration can only be completed via the MED if the verifïcation on the IDS results in a positive comparison status. A further embodiment of a method of authorizing a user of an identity document comprising biometric user data that are stored in an electronic memory that is part of the identity document, involves the steps of:
Reading the biometric user data trom the electromc memory of the identity document and storing the biometric user data in the memory unit of a mobile electronic device (MED), the MED having a sensor for receiving biometric data of the user,
Capturing biometric data of the user using the sensor on the MED and storing the data in the memory unit, and
Comparing the captured biometric data with the stored biometric user data and generating a positive authentication status when the captured biometric data match the stored biometric data.
By reading out the biometric data ffom the memory of the identity document, a reference is obtained on the MED for comparing with live biometric data captured via the MED’s sensor. Only when a local match is made on the MED between the live biometric data and the biometric data that are captured ffom the ID’s electronic memory, will further steps in the authentication procedure, in particular the procedure of registering the user and MED as a registered activated identity MED on the IDS, be allowed.
Access of a server for receiving an on line service, for instance on a govemment server on which registered Citizen data of the user are stored, can according to an embodiment of a method according to the invention be carried out by the steps of:
Input of a user-identifïcation to the IDS by the holder of a registered activated identity MED and receiving a notifïcation on the registered activated identity MED,
Inputting biometric data of the holder via the sensor into the memory unit of the MED, forwarding the biometric data and the template ffom the MED to the IDS, and On the IDS comparing the template and the biometric data, and for a positive match providing access to the user on a server) and/or to receiving of a service on the MED or on the terminal.
In a preferred embodiment, the captured biometric data comprises a portrait image of the holder, the sensor comprising a camera and the biometric template being formed on the basis of the portrait image.
The biometric template may be formeel on the basis of at least two portrait images, such as for instance by the best out of three. A further embodiment of a method according to the invention, wherein the identity document comprises machine readable data, the method comprises following on step b, the steps of:
Transferring the machine readable data into the memory unit of the MED via the camera and the ID data capture application, and comparing the machine readable data with the personalization data transferred ffom the memory of the Identity document into the memory unit of the MED and generating a consistency status, wherein
In case of a negative consistency status the MED does not carry out the subsequent step of transferring data ffom the MED (2) to the IDS.
By a local comparison on the MED of the MRZ that is optically presented on the ID with the MRZ data contained in the electronic memory of the ID, a further verifïcation step is provided that improves the security of the method according to the invention.
Brief description of the drawings
An embodiment of a method, a system, a mobile electronic device and a software programme product according to the invention will be described in detail with reference to the accompanying drawings. In the drawings:
Fig. 1 shows the fïrst step in the registration of a user’s mobile electronic device (MED) on an identity document server (IDS),
Fig. 2 shows the step of downloading of a biometric application and a data capture application on the MED,
Fig. 3 shows reading of authentication data and personalization data from the memory chip and a machine readable zone (MRZ) of an Identity document into the memory of the MED,
Fig. 4 shows transferring the authentication and personalization data to the IDS for forming a registered MED,
Fig. 5 shows the steps of forwarding biometric user data trom the MED to the Identity Document Server for forming a biometric template and storing the template on the MED to form a registered activated identity MED,
Fig. 6 shows the fïrst step in the authentication stage for obtaining access to an electronic service provider,
Fig. 7 shows in the authentication stage the forwarding the user’s biometric data and the biometric template from the MED to the IDS, for providing authorization for access to a server and/or for receiving of an e service,
Fig. 8 shows a flow diagram of the steps of ID Proofïng and registration of a user and of a MED on the IDS, corresponding to fïgs. 1-4.
Fig. 9 shows the user interaction while carrying out the steps of fig. 8,
Fig. 10 shows a flow diagram of the activation steps following on the ID-proofing and registration steps of fig. 8 and corresponding to fig. 5.
Fig. 11 shows the user interaction while carrying out the steps of fig. 9,
Fig. 12 shows a flow diagram of the authorization steps for obtaining access to an e-service corresponding to figs. 6 and 7, and
Fig. 13 shows the user interaction while carrying out the steps of fig. 12.
Detailed description of the invention
Fig. 1 shows a remote terminal 1 or a mobile electronic device (MED) 2 being connected via the internet 5 to an Identity Document Server (IDS) 3. The IDS 3 stores records 4 of personalization data of the holder of an identity document and authenticity data of such an identity document, and may be operated by the company or organization that has issued the identity document. The identity document can for instance be a passport, a driver’s license, a bank card, credit card or identity card or badge and may be wholly or partly in electronic form. The personalization data comprises for instance name, address, date of birth and/or biometric data such as a digital portrait template, a finger print or an iris scan, which data may be provided in a Machine Readable Zone (MRZ) of the ID or which may be stored in the electronic memory of a chip on the ID. The authentication data may comprise a unique number, a certificate or certificate chain, security codes and the like.
Upon input of a user ID, and optionally a password, a user may be logged on to the IDS 3 and may be provided with a code or a link for downloading an application onto the MED 2, as shown in fïg. 2. The code that is provided may be alphanumeric and can be entered via the MED to log onto server 6, or can be a QR code that is displayed on the display of the terminal 1 and recorded with the camera of the MED to connect the MED to a server 6, or can be an IP address of the server 6 or a similar code. From the server 6, a biometric temp late application 7’and ID data capture application 7 is downloaded onto the MED 2. Altematively, the IDS 3 provides a notification to the MED 2 that the applications 7, 7’can be downloaded from another server of an application provider which has been authorized by the IDS to allow a download from that server by the user.
As shown in fïg. 3, the ID data capture application 7 allows transfer of Identification and personalization data that are stored in the memory chip 10 of an identity document 11 to be transferred to a memory unit 12 of the MED. Data transfer can be carried out wireless via Bluetooth, Near Field Communication (NFC), or via a physical connection of the MED 2 to the chip 10 via a card reader. In specific cases, data may also be provided on the identity document 11 in a machine readable zone (MRZ) 13, for instance in the form of a barcode. The data capture application 7 on the MED Controls transfer of the machine readable data into the memory 12 of the MED via the camera 14, and may carry out a fïrst consistency check on the data derived from the MRZ. If an inconsistency is found, the data capture application 7 on the MED may shut down further execution of the proofïng and registration steps.
In case a MRZ 13 is provided on the identity document 11, the data capture application 7 may execute a further consistency check by comparing the machine readable data with the data derived from the chip 10, and in case of a mismatch shut down further operation of the application. It is at this stage also possible that the data capture application 7 executes on the MED a comparison of a selfie photograph of the user, taken with the camera 14 of the MED, with the electronic template of the portrait 15 that is stored in the chip 10 of the identity document. In case of an inconsistency between the template of the portrait 15 and the recorded selfie, the data capture application may shut down further operation.
In figure 4 it is illustrated how the personalization data and authentication data from the identity document 11 is transferred from the memory unit 12 of the MED to the IDS 3. In the IDS 3, the personalization data and authentication data are compared with the data sets 4 of the identity documents that are stored on the sever, including for instance comparison of the document’s unique number, the certificate chain etc. In case the comparison gives matching results, the server 3 generates an activation code that is forwarded to the MED 2 or to the remote terminal 2, on which it may appear as a QR code on the screen and can be captured by the camera 14 of the MED. The subscriber number of the Med has been stored with the data record 4 of the identity document 11 on the IDS 3, so that the MED 2 now is a registered MED.
After retuming the activation code to the IDS 3, the biometric template application 7’ that has been downloaded from the server 6 may be activated. The MED is now registered as a registered activated MED on the IDS 3.
Fig 5 shows in the activation stage of the MED, biometric data 20, 21 of the user being input into the MED 2 via the biometric template application 7’. The biometric data may comprise a portrait picture 20 of the user, captured by the camera 14 of the MED or a fïngerprint 21 captured by a touch sensor 22 on the MED 2. Other biometric data may be used, such as an iris scan, and the like. The biometric data 20, 21 are transferred to the IDS 3 and converted into biometric templates 23, 24. The facial template may be formed by a set of key positions such as eyes, corners of the mouth, nose, chin and cranial points or another representation that is formed on the basis of the digital image 20. A thumb print template 24 may for instance be formed by a binary representation of the lines or interspaced positions that are derived on the basis of the thumb print image 21. The reference template 23, 24 may be stored on the IDS 3 together with the record 4 of the identity document. Altematively, the reference template 23, 24 is coded and secured against eavesdropping, and is retumed to the MED, is stored in the memory unit 12 and is not retained on the IDS 3. This completes the registration/activation stage and results in a registered activated identity MED 2.
Fig 6 shows the first step in the authentication stage wherein a user wants to access an on-line service or an e-service 29 via the terminal 1. The user is in possession of a registered activated identity MED 2. The user on the terminal 1 selects the identity provider, which is the issuing organization from which the user has received his identity document and on whose IDS 3 the users MED has been registered as a registered activated identity MED. Aftcr input of the user’s usemame and password to the IDS3, the activated identity MED 2 receives a notifïcation 28 ffom the IDS 3. Using the camera 14 and/or the touch sensor 22 of the MED 2, the user takes a portrait image (‘selfïe’) 20’ or a fïngerprint 21’.The portrait image 20’ and the portrait template 23 that has been stored in the memory 12 of the registered activated identity MED2, are transferred to the IDS 3 via the biometric template application 7’. Altematively, or in addition, the thumbprint 2Γ and thumbprint template 24 may be transferred to the IDS. On the IDS 3, it is determined if images 20’, 2Γ correspond to the templates 23, 24. If a positive match is made, the IDS 3 provides an authorization to the service provider 29, allowing access by the user on the server, or other interaction required for receiving the e-service, via the terminal 1.
The terminal 1 may be a computer terminal or may be a personal computer, a laptop, a tablet or other a mobile electronic device, and may for instance also be formed by the MED 2.
Fig 8 shows the ID proofïng and registration steps 30-38 according to the invention and described here before in relation to fïgs. 1-4. In step 30 the holder of an ID document 11 utilizes the camera 14 on the MED 2 on which the ID data capture application 7 and the biometric template application 7’ have been downloaded and installed, to capture authentication data from the machine readable zone MRZ of the ID. A flrst consistency check is carried out on the MED at 31 by the ID data capture application 7 to check if the authentication data in the MRZ has not been altered in an unauthorized manner.
In step 32, electronic personalization data of the holder and biometric data such as a digital photograph are read from the chip 10 on the ID, using the MED’s NFC transmitter or wireless Bluetooth communication unit. Step 33 involves taking a self-portrait or ‘selfïe’ by the user with the camera 14 of the MED 2. In step 34 a comparison is carried out locally on the MED to check if the data captured from the MRZ match with the data read from the chip 10. Also, via the data capture application 7 on the MED, a comparison is made at 35 between the digital self-portrait taken by the user using the camera 14 of the MED and the digital photograph that is stored on the chip 10 of the ID. In the absence of a positive match, the data capture application 7 terminates the operation and prevents the subsequent steps 36-38 ff om being carried out.
In case a positive comparison status is generated, the MED in step 36 transfers the personalization data and the authentication data that have been captured on the MED trom the MRZ and trom the chip 10 of the ID 11, to the IDS 3. On the IDS 3, the data is checked and verified, such as a check of the ID’s authentication certificate, unique number, PIN code and other coded data that pertain to the ID and that have been stored as records on the Identity Document Server.
If a positive comparison status is found on the IDS, the MED is in step 37 registered on the IDS, for instance by storing the subscriber number of the MED together with the record containing personalization and authentication data of the holder of the IDS. In step 38, an activation code is generated on the IDS 3 which code is forwarded back to the user via terminal 1 or via the MED 2.
Fig. 9 schematically shows the actions carried out by the holder of an identity document in the ID proofïng and registration steps 30-38 of fig. 8.
In step 1 the holder chooses the identity provider and accesses the website of the identity provider on the terminal 1. Step 2 involves entering the user’s profile details 39 on the website of the identity provider, such as user name, email address and subscriber number of the user’s MED. In step 3 the user is notified by the IDS 3 on its MED 2 that the data capture application 7 and biometric template application 7’can be downloaded on the MED 2.
In step 4 of fig. 9, the user downloads the application 7,7’ on the MED 2 and in step 5 captures with the application 7,7’ on the MED the personalization and authentication data from the MRZ 13 and from the chip 10 of the user’s ID, in this example the user’s passport 11. The ID has been issued by the identity provider and personalization data of the holder/user and authentication data pertaining to the ID have are stored on the server of the identity provider (IDS 3). Steps 30 - 32 in fïg. 8 have now been completed.
In step 6 of fïg. 9, the user takes a self-portrait, or ‘seifie’ 48 with the camera of the MED 2. In step 7 a comparison is made on the MED 2 using the application 7, 7’, of the photo 48 with the digital portrait image 47 that has downloaded onto the MED from the chip 10 of the passport 11. This corresponds to step 35 of fïg. 8. If no positive match is obtained, the MED 2 terminates further operation and does not forward the personalization data and authentication data that were captured from the chip 10 of the passport 11 to the IDS 3, completing step 35 in fïg. 8.
When a positive match is found between the self-portrait 48 and the digital photograph 47, which digital photograph may be in the form of a template comprising a number of features of the user’s face such as position of eyes, nose, mouth, chin, circumference of the face, etc., the captured authentication data and personalization data are transferred from the MED 2 to the IDS 3 in step 8. On the IDS 3, data consistency checks are carried out which may involve an extemal service to check if the ID (which may be an entirely electronic document) is genuine, for instance involving verifïcation of the consistency between the document unique number and the captured data, inspection of the authentication certifïcate, and other verifïcation steps. This corresponds to step 36 of fïg. 8.
In step 9 of fïg.9 the registration of the MED 2 on the IDS3 is completed and steps 37 and 38 of the ID proofïng stage shown in fïg. 8 are completed.
Fig. 10 show activation steps 40-43 that are carried out on the IDS 3. In step 40 the user scans the activation code 16 which may be QR code displayed on the remote terminal 1 (see fig. 4). The code may also comprise an alfa numeric code and may also be received on the user’s MED. After input of the code to the IDS 3 in step 40, the MED 3 is registered as an activated MED in step 41.
In step 42, the IDS will create a reference biometric template 23, 24 of the user. The biometric data may comprise a thumbprint, iris scan or any other biometric data that may be captured with the sensors of the MED. In this example, the biometric data comprise a portrait photograph of the user. The user provides one more selfïe photographs to the IDS via the MED, and from the best of three the software on the IDS calculates a biometric reference template 23, 24. This reference template is coded and is retumed to the MED 2 in step 43, completing the activation stage. This results in the user now having a registered activated identity MED with a 2 factor authentication: a trusted MED and face biometrics.
Fig. 11 schematically shows the actions carried out by the user in the activation steps 40-43 of fig. 10. In step 1, the user scans the retumed activation code 16 on the MED 2. Step 2 involves forming of the reference biometric template (step 42 of fig. 10) on the IDS, on the basis of one or more selfie photographs 20, (or other biometric data 21 captured on the MED 2) the user makes with the MED’s camera, and storing the reference template 23,24 on the MED (step 43 of fig 10).The user may register his Personal Identification Number (PIN) 46 with the IDS 3 as a fallback position in case authentication via the reference biometric template 23,24 inadvertently fails to provide authentication . In step 3, the user is now provided with a 2 factor authentication on his MED 2 including face or thumbprint biometrics, which can now be used instead of identity document 11.
Fig. 12 shows the steps 50-55 of the authentication stage for obtaining access by a user to an e-service on a server 29 as illustrated above in relation to figs. 6 and 7. In step 50 the user selects on the site of the e-service provider the Identity provider and forwards to the identity provider - that operates the IDS3- a user name and password. In step 51a notification 28 is forwarded ffom the IDS3 to the registered activated identity MED 2 of the user indicating that the IDS 3 is ready to carry out the authentication steps. Step 52 involves using the registered activated MED2 to capture biometric data, in this example a self-portrait 20’. The MED2 forwards in step 53 the captured biometric data 20’, 2Γ and the biometric template 23, 24 that is stored in its memory unit 12, to the IDS 3. On the IDS 3, the biometric data 20’, 2Γ and the templates 23, 24 are proceseed and compared in step 54. Step 54 terminates the operation in case the comparing operation does not result in a positive match. In case the companng operation 54 results in a positive match, step 55 involves the IDS 3 providing access for the user to server 29 on which the requested e service is carried out.
Fig. 13 schematically shows the actions carried out by the user in the authentication stage 50-55 of fig. 12. Step 1 involves selection of the e-service by the user. The e-service may for instance involve interaction with the govemment on a database 29 where the user’s citizen’s data and certifïcates are stored. The user selects in step 2 the Identity Provider that has registered the user’s MED 2 on the IDS 3 and identifïes himself to the Identity Provider by a usemame and password in step 3. This completes step 50 in fig. 12. The IDS3 provides a notifïcation 28 to the user’s registered activated identity MED2 to indicate that the user should carry out the identity proofïng steps 52 and 53 of fig. 12. The user in step 5 captures biometric data 20’, 21’ on the MED 2 (step 52 of fig. 12) and these data are forwarded to the IDS3 for comparing in step 6 (step 53 in fig. 12). In case a positive match of the biometric data 20’,21’, and the biometric temp late 23,24 is established on the IDS3 (step 54 of fig. 12), the IDS 3 provides access for the user to the e service on server 29 in step 7 (step 55 in fig. 12).
Claims (22)
Priority Applications (14)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MA044828A MA44828A (en) | 2016-02-16 | PROCESS, SYSTEM, DEVICE, AND COMPUTER PRODUCT-PROGRAM, INTENDED FOR REMOTE AUTHORIZATION OF A USER OF DIGITAL SERVICES | |
NL2016272A NL2016272B1 (en) | 2016-02-16 | 2016-02-16 | Method, system, device and software programme product for the remote authorization of a user of digital services. |
AU2017221747A AU2017221747B2 (en) | 2016-02-16 | 2017-02-16 | Method, system, device and software programme product for the remote authorization of a user of digital services |
BR112018016645A BR112018016645A2 (en) | 2016-02-16 | 2017-02-16 | method, system, apparatus and software program product for remote authorization of digital services user |
PCT/NL2017/050094 WO2017142407A1 (en) | 2016-02-16 | 2017-02-16 | Method, system, device and software programme product for the remote authorization of a user of digital services |
CA3014738A CA3014738A1 (en) | 2016-02-16 | 2017-02-16 | Method, system, device and software programme product for the remote authorization of a user of digital services |
EP17710067.4A EP3417392B1 (en) | 2016-02-16 | 2017-02-16 | Method, system, device and software programme product for the remote authorization of a user of digital services |
US15/998,720 US11228587B2 (en) | 2016-02-16 | 2017-02-16 | Method, system, device and software programme product for the remote authorization of a user of digital services |
ES17710067T ES2890833T3 (en) | 2016-02-16 | 2017-02-16 | Method, system, device and software program product for the remote authorization of a user of digital services |
DK17710067.4T DK3417392T3 (en) | 2016-02-16 | 2017-02-16 | PROCEDURE, SYSTEM, DEVICE AND SOFTWARE PROGRAM FOR REMOTE AUTHORIZATION OF A DIGITAL SERVICES USER |
SG11201806944TA SG11201806944TA (en) | 2016-02-16 | 2017-02-16 | Method, System, Device And Software Programme Product For The Remote Authorization Of A User Of Digital Services |
TNP/2018/000283A TN2018000283A1 (en) | 2016-02-16 | 2017-02-16 | Method, system, device and software programme product for the remote authorization of a user of digital services |
CONC2018/0008614A CO2018008614A2 (en) | 2016-02-16 | 2018-08-16 | Method, system, device and software program product for remote authorization of a user of digital services |
ECSENADI201862261A ECSP18062261A (en) | 2016-02-16 | 2018-08-16 | Method, system, device and software program product for remote authorization of a user of digital services |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2016272A NL2016272B1 (en) | 2016-02-16 | 2016-02-16 | Method, system, device and software programme product for the remote authorization of a user of digital services. |
Publications (1)
Publication Number | Publication Date |
---|---|
NL2016272B1 true NL2016272B1 (en) | 2017-08-22 |
Family
ID=55802439
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NL2016272A NL2016272B1 (en) | 2016-02-16 | 2016-02-16 | Method, system, device and software programme product for the remote authorization of a user of digital services. |
Country Status (14)
Country | Link |
---|---|
US (1) | US11228587B2 (en) |
EP (1) | EP3417392B1 (en) |
AU (1) | AU2017221747B2 (en) |
BR (1) | BR112018016645A2 (en) |
CA (1) | CA3014738A1 (en) |
CO (1) | CO2018008614A2 (en) |
DK (1) | DK3417392T3 (en) |
EC (1) | ECSP18062261A (en) |
ES (1) | ES2890833T3 (en) |
MA (1) | MA44828A (en) |
NL (1) | NL2016272B1 (en) |
SG (1) | SG11201806944TA (en) |
TN (1) | TN2018000283A1 (en) |
WO (1) | WO2017142407A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107704251A (en) * | 2017-09-26 | 2018-02-16 | 深圳市亿联智能有限公司 | A kind of safe programming methods of OTP based on computer empowerment management |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018065820A1 (en) * | 2016-10-04 | 2018-04-12 | Assa Abloy Ab | Multi factor authentication using different devices |
CN107026836B (en) * | 2016-10-28 | 2020-03-06 | 阿里巴巴集团控股有限公司 | Service implementation method and device |
US10491616B2 (en) | 2017-02-13 | 2019-11-26 | Microsoft Technology Licensing, Llc | Multi-signal analysis for compromised scope identification |
NL2019698B1 (en) | 2017-10-10 | 2019-04-19 | Morpho Bv | Authentication of a person using a virtual identity card |
EP3602333A1 (en) * | 2017-10-24 | 2020-02-05 | Google LLC | Customized user prompts for autofilling applications |
US10693650B2 (en) | 2017-12-19 | 2020-06-23 | Mastercard International Incorporated | Biometric identity verification systems, methods and programs for identity document applications and renewals |
US11233647B1 (en) * | 2018-04-13 | 2022-01-25 | Hushmesh Inc. | Digital identity authentication system |
FR3095371B1 (en) * | 2019-04-25 | 2021-04-30 | Idemia Identity & Security France | Method for authenticating an individual's identity document and possibly for authenticating said individual |
US20230342440A1 (en) * | 2019-06-25 | 2023-10-26 | Scientia Potentia Est II, LLC | System for system for creating and storing verified digital identities |
US20220215161A1 (en) * | 2019-10-25 | 2022-07-07 | Google Llc | Customized User Prompts for Autofilling Applications |
US11924199B1 (en) * | 2023-05-10 | 2024-03-05 | Fmr, Llc | Systems and methods for user authentication using an imaged machine-readable identity document |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090132813A1 (en) * | 2007-11-08 | 2009-05-21 | Suridx, Inc. | Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones |
US20110145904A1 (en) * | 2009-12-14 | 2011-06-16 | Erix Pizano | Enterprise biometric authentication system for a windows biometric framework |
DE102014100463A1 (en) * | 2014-01-16 | 2015-07-16 | Bundesdruckerei Gmbh | A method of identifying a user using a communication device |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030023858A1 (en) | 2001-07-26 | 2003-01-30 | International Business Machines Corporation | Method for secure e-passports and e-visas |
WO2012125655A1 (en) * | 2011-03-14 | 2012-09-20 | Conner Investments, Llc | Bluetooth enabled credit card with a large date storage volume |
US8887232B2 (en) * | 2012-02-27 | 2014-11-11 | Cellco Partnership | Central biometric verification service |
US9087204B2 (en) * | 2012-04-10 | 2015-07-21 | Sita Information Networking Computing Ireland Limited | Airport security check system and method therefor |
US10140537B2 (en) * | 2012-10-26 | 2018-11-27 | Daon Holdings Limited | Methods and systems for capturing biometric data |
US20150088778A1 (en) | 2013-09-24 | 2015-03-26 | Adam Y. Tsao | System and method for verifying a travelers authorization to enter into a jurisdiction using a software application installed on a personal electronic device |
US11157905B2 (en) * | 2015-08-29 | 2021-10-26 | Mastercard International Incorporated | Secure on device cardholder authentication using biometric data |
US11734678B2 (en) * | 2016-01-25 | 2023-08-22 | Apple Inc. | Document importation into secure element |
AU2018333068B2 (en) * | 2017-09-18 | 2023-02-23 | Mastercard International Incorporated | Systems and methods for managing digital identities associated with mobile devices |
-
0
- MA MA044828A patent/MA44828A/en unknown
-
2016
- 2016-02-16 NL NL2016272A patent/NL2016272B1/en active
-
2017
- 2017-02-16 US US15/998,720 patent/US11228587B2/en active Active
- 2017-02-16 ES ES17710067T patent/ES2890833T3/en active Active
- 2017-02-16 CA CA3014738A patent/CA3014738A1/en active Pending
- 2017-02-16 TN TNP/2018/000283A patent/TN2018000283A1/en unknown
- 2017-02-16 EP EP17710067.4A patent/EP3417392B1/en active Active
- 2017-02-16 DK DK17710067.4T patent/DK3417392T3/en active
- 2017-02-16 BR BR112018016645A patent/BR112018016645A2/en not_active IP Right Cessation
- 2017-02-16 SG SG11201806944TA patent/SG11201806944TA/en unknown
- 2017-02-16 AU AU2017221747A patent/AU2017221747B2/en active Active
- 2017-02-16 WO PCT/NL2017/050094 patent/WO2017142407A1/en active Application Filing
-
2018
- 2018-08-16 EC ECSENADI201862261A patent/ECSP18062261A/en unknown
- 2018-08-16 CO CONC2018/0008614A patent/CO2018008614A2/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090132813A1 (en) * | 2007-11-08 | 2009-05-21 | Suridx, Inc. | Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones |
US20110145904A1 (en) * | 2009-12-14 | 2011-06-16 | Erix Pizano | Enterprise biometric authentication system for a windows biometric framework |
DE102014100463A1 (en) * | 2014-01-16 | 2015-07-16 | Bundesdruckerei Gmbh | A method of identifying a user using a communication device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107704251A (en) * | 2017-09-26 | 2018-02-16 | 深圳市亿联智能有限公司 | A kind of safe programming methods of OTP based on computer empowerment management |
CN107704251B (en) * | 2017-09-26 | 2020-12-11 | 深圳市亿联智能有限公司 | OTP (one time programmable) safe programming method based on computer authorization management |
Also Published As
Publication number | Publication date |
---|---|
EP3417392B1 (en) | 2021-06-23 |
US20200259825A1 (en) | 2020-08-13 |
MA44828A (en) | 2018-12-26 |
US11228587B2 (en) | 2022-01-18 |
AU2017221747B2 (en) | 2022-04-07 |
TN2018000283A1 (en) | 2020-01-16 |
EP3417392A1 (en) | 2018-12-26 |
ECSP18062261A (en) | 2018-10-31 |
WO2017142407A1 (en) | 2017-08-24 |
AU2017221747A1 (en) | 2018-08-30 |
BR112018016645A2 (en) | 2018-12-26 |
CO2018008614A2 (en) | 2018-08-31 |
CA3014738A1 (en) | 2017-08-24 |
SG11201806944TA (en) | 2018-09-27 |
ES2890833T3 (en) | 2022-01-24 |
DK3417392T3 (en) | 2021-09-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
NL2016272B1 (en) | Method, system, device and software programme product for the remote authorization of a user of digital services. | |
US12014369B2 (en) | Personal digital key initialization and registration for secure transactions | |
AU2016214117B2 (en) | Systems and methods for generating an auditable digital certificate | |
US11595380B2 (en) | User authentication based on RFID-enabled identity document and gesture challenge-response protocol | |
US20120032782A1 (en) | System for restricted biometric access for a secure global online and electronic environment | |
AU2017359004A1 (en) | Biometric transaction system | |
JP2009543176A (en) | Traceless biometric identification system and method | |
JP2004030334A (en) | Method, system and program for biometrics authentication service | |
JP2020013525A (en) | Authentication device, authentication system, and authentication method | |
US20220138298A1 (en) | Device and systems for strong identity and strong authentication | |
JP4571426B2 (en) | Authentication system | |
WO2013051010A2 (en) | A system and method for implementing biometric authentication for approving user's financial transactions | |
JPWO2021131059A1 (en) | Authentication system, authentication device, authentication method, and program | |
OA18754A (en) | Method, system, device and software programme product for the remote authorization of a user of digital services | |
WO2021192150A1 (en) | Authentication system, user terminal, authentication method, and program | |
GB2610439A (en) | Image authentication | |
WO2020067990A1 (en) | Biometric identification method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
HC | Change of name(s) of proprietor(s) |
Owner name: IDEMIA THE NETHERLANDS B.V.; NL Free format text: DETAILS ASSIGNMENT: CHANGE OF OWNER(S), CHANGE OF OWNER(S) NAME; FORMER OWNER NAME: MORPHO B.V. Effective date: 20240305 |